Introduction
Packet sniffing is one of the most important techniques in cybersecurity and penetration testing. With tools like airodump-ng, you can capture and analyse wireless packets to test Wi-Fi security. In this guide, we’ll walk you through the step-by-step process of packet sniffing using airodump-ng on Linux.
What is Packet Sniffing?
Packet sniffing is the process of capturing data packets as they travel over a network. Ethical hackers and penetration testers use sniffing to monitor traffic, detect vulnerabilities, and strengthen network defenses.
One of the most popular tools for this is airodump-ng, part of the Aircrack-ng suite, which helps capture Wi-Fi packets when your adapter is set to monitor mode.
Step 1: Identify Your Network Adapter
First, you need to check the name of your wireless network adapter. Run the following command:
iwconfig
This will display your network interfaces. Look for the one associated with your Wi-Fi adapter (e.g., wlan0).
Step 2: Put the Adapter in Monitor Mode
Monitor mode allows your adapter to capture all wireless traffic instead of just packets intended for your device.
1. Bring the adapter down:
ifconfig (network-adapter) down
2. Kill conflicting processes:
airmon-ng check kill
3. Enable monitor mode:
iwconfig (network-adapter) mode monitor
4. Bring the adapter back up:
ifconfig (network-adapter) up
At this point, your Wi-Fi adapter is ready for packet sniffing.
Step 3: Start Packet Sniffing with Airodump-ng
Now, launch airodump-ng to start capturing packets:
airodump-ng (network-adapter)
You’ll see a list of nearby access points, including:
BSSID (MAC address of the router)
Channel
Encryption type (WEP, WPA/WPA2)
Signal strength
This data helps you analyze the security of wireless networks and identify potential targets for penetration testing.
Step 4: Save Captured Packets (Optional)
To store packets for later analysis, run:
airodump-ng --write capture (network-adapter)
The packets will be saved in .cap files, which you can analyze further with tools like Wireshark or Aircrack-ng.
Why Use Airodump-ng for Packet Sniffing?
Captures live Wi-Fi packets in real time
Useful for penetration testing and ethical hacking labs
Integrates with tools like Aircrack-ng for advanced Wi-Fi attacks
Helps security researchers understand network vulnerabilities
⚠️ Disclaimer: This tutorial is for educational and ethical hacking purposes only. Always use packet sniffing on networks you own or have permission to test.

